Vulnerability CVE-2018-1000180


Published: 2018-06-05

Description:
Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later.

Type:

CWE-310

(Cryptographic Issues)

Vendor: Debian
Product: Debian linux 
Version: 9.0;
Vendor: Oracle
Product: Peoplesoft enterprise peopletools 
Version:
8.57
8.56
8.55
Product: Retail xstore point of service 
Version: 7.1; 7.0;
Product: Communications application session controller 
Version: 3.8.0; 3.7.1;
Product: Retail convenience and fuel pos software 
Version: 2.8.1;
Product: Business process management suite 
Version:
12.2.1.3.0
12.1.3.0.0
11.1.1.9.0
Product: Soa suite 
Version: 12.2.1.3.0; 12.1.3.0.0;
Product: Webcenter portal 
Version: 12.2.1.3.0; 11.1.1.9.0;
Product: Managed file transfer 
Version: 12.2.1.3.0; 12.1.3.0.0;
Product: Weblogic server 
Version: 12.1.3.0.0;
Product: Enterprise repository 
Version: 12.1.3.0.0;
Product: Business transaction management 
Version: 12.1.0;
Product: Api gateway 
Version: 11.1.2.4.0;
Vendor: Redhat
Product: Jboss enterprise application platform 
Version: 7.1.0;
Product: Virtualization 
Version: 4.2; 4.0;
Vendor: Bouncycastle
Product: Legion-of-the-bouncy-castle-java-crytography-api 
Version:
1.59
1.58
1.57
1.56
1.55
1.54
Product: Fips java api 
Version: 1.0.1;
Vendor: Netapp
Product: Oncommand workflow automation 

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None

 References:
http://www.securityfocus.com/bid/106567
https://access.redhat.com/errata/RHSA-2018:2423
https://access.redhat.com/errata/RHSA-2018:2424
https://access.redhat.com/errata/RHSA-2018:2425
https://access.redhat.com/errata/RHSA-2018:2428
https://access.redhat.com/errata/RHSA-2018:2643
https://access.redhat.com/errata/RHSA-2018:2669
https://access.redhat.com/errata/RHSA-2019:0877
https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad
https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839
https://security.netapp.com/advisory/ntap-20190204-0003/
https://www.bouncycastle.org/jira/browse/BJA-694
https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test
https://www.debian.org/security/2018/dsa-4233
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Related CVE
CVE-2019-5503
OnCommand Workflow Automation versions prior to 5.0 shipped without certain HTTP Security headers configured which could allow an attacker to obtain sensitive information via unspecified vectors.
CVE-2019-5498
OnCommand Insight versions through 7.3.6 may disclose sensitive account information to an authenticated user.
CVE-2019-5502
SMB in Data ONTAP operating in 7-Mode versions prior to 8.2.5P3 has weak cryptography which when exploited could lead to information disclosure or addition or modification of data.
CVE-2019-5501
Data ONTAP operating in 7-Mode versions prior to 8.2.5P3 may disclose sensitive LDAP account information to unauthenticated remote attackers.
CVE-2019-5493
Data ONTAP operating in 7-Mode versions prior to 8.2.5P3 are susceptible to a vulnerability which discloses information to an unauthenticated attacker. A successful attack requires that multiple non-default options be enabled.
CVE-2019-14379
SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used, leading to remote code execution.
CVE-2019-5497
NetApp AFF A700s Baseboard Management Controller (BMC) firmware versions 1.22 and higher were shipped with a default account enabled that could allow unauthorized arbitrary command execution.
CVE-2019-8936
NTP through 4.2.8p12 has a NULL Pointer Dereference.

Copyright 2019, cxsecurity.com

 

Back to Top